Upload
melanie-stokes
View
224
Download
0
Embed Size (px)
Citation preview
1
Kaseya AdvancedWorkshop
Developed by
Kaseya UniversityPowered by
IT ScholarsKaseya Version 6.2
Last updated on June 25, 2012
DAY ONE
2
Kaseya Advanced Workshop
WORKSHOPINTRODUCTION
3
Kaseya Advanced Workshop• Pre-requisite
– Kaseya Fundamentals Workshop
• What is covered?– Kaseya Advanced Topics
• Duration– 2 day, 3 hours of lecture and lab per day– 5 weeks or 35 days of access to portal and lab
4
What is included?• 2 x 3 hours of instructor-led online sessions
– Delivered in two consequent days, 3 hours per day.
• 5 weeks (or 35 days) of unlimited access – Training materials includes training videos, interactive
videos, self-assessment quizzes, and reading material available 24x7.
• 80 hours of virtual lab– Virtual labs include five dedicated virtual machines and
one VSA account, accompanied with hands-on exercises and step-by-step instructions.
– 40 hours will expire after the first week – 10 hours per week for the next 4 weeks
• 1 Certification Test
5
Certification Test• Available 24x7 during the 35 days• The passing grade is 90 out of 100• Includes two parts:
– Theory • 30 points • 30 minutes for 30 multiple-choice or T/F questions• Unlimited number of attempts; highest-grade
– Hands-on• 70 points• 2 hours to perform some randomly selected tasks• Only one attempt is included for free
6
Why do I need the certificate?• With certificates in Fundamentals,
Advanced, and SysAdmin your company will receive Premium Service Status.– Contact your sales person for details of the
advantages of Premium Service Status.
• Adding KCA to your resume will make you more competitive in the IT market.
7
Roadmap!• Day One
– Advanced Agent Procedures
• Day Two– Advanced Monitoring– Advanced Reporting
8
How can you ask your question?
• Type your question in the GoToMeeting Chat
• From time to time, I will stop to answer them
• If you have a burning question, you can also raise your hand to indicate that you need an answer quickly!
• For offline questions, send them to [email protected]
9
Kaseya Advanced Workshop
Virtual Labs Overview
10
Creating Your Account• It would have been best if you had created
your account prior to the workshop. • If you have not done so, please do NOT try
to create your account now, as you may fall behind of the lecture topics. You can create your account during the break or after today’s session.
• In the following slides, we will give you a quick overview of the process, so that you can create your account properly.
11
Note• If you have created an account on
www.it-scholars.com for another workshop (e.g., Kaseya Fundamentals Workshop), you do not need to create another account.
• You can simply use your previously created account. You just need to enroll into the new course.
• If you forgot your password, as long as you remember either your username or the email address that you used before, you can reset your password.
12
It Is Your T
urn!
Let’s Start!• Go to www.it-scholars.com • Create a new account
13
It Is Your T
urn!
Create a New Account
• The required fields are marked by *• Username should be in the format of firstname.lastname and should
NOT include: " / \ [ ] : ; | = , + * ? < > @• Do not use your bank account password• A good password is 6 to 10 characters long• Use your work email
14
It Is Your T
urn!
Create a New Account
• Your Kaseya Customer ID is the first 6 letters of your Kaseya License Code (see System > License Manager).
• If you do not have a Skype/Google account, enter: “Do not have one!”
• If you do not know what is your Kaseya Sales Rep’s email, just enter: “[email protected]".
• For the course, select “Kaseya Advanced”• For the delivery, select “Instructor Led” or “Self-Paced” as applicable.
15
Note• After clicking on Create my new account
button, you may receive a “Session Key Error” message
• This is related to the Cookie security settings in your browser.
• You can add www.it-scholars.com to list of your trusted sites to address this issue.
• Alternatively, you can use Chrome as its default security settings are more relaxed than other mainstream browsers.
16
It Is Your T
urn!
Create New Account• Once successfully submitted, you will
receive an email confirmation with a link to confirm your account.
• After visiting the confirmation link, you can login to the portal– www.it-scholars.com– Chrome is a preferred browser
17
It Is Your T
urn!
Enroll In This Week’s Kaseya Advanced Course
• Once successfully logged in, click on the Kaseya Advanced course for this week
Note: If you do not see the list of courses, and you cannot find the All Courses button on the page, simply click on the ITA Portal link located at the top right of the page, and then click on the All Courses button.
18
It Is Your T
urn!
Enroll In this week’s Kaseya Advanced Course
• The enrollment key is 2012
• Or the instructor would provide the key
19
You can safely ignore this part!
You can safely ignore this part!This Workshop
Announcements
Lecture Notes and
Recorded Videos
Course Topic
Quick Links
Show Only This Section
Four-Step Reinforcement Learning
Orientation Video
Course Home Page
20
Workshop Course Home Page• News forum
– No need to visit this link as you receive an email for any announcements posted.
• Quick Links:– Access Your Virtual Lab
• You can access an already scheduled virtual lab or schedule one on-demand.
– Pre-Schedule Your Virtual Lab (Optional)• You can pre-schedule, edit, and cancel your virtual labs and
certification tests.
– Check for Your Remaining Quota (Optional)• You can check how much of your quota is still available.
– Request for More Quota (Optional)• You can request for more quota, if need be.
21
Access You Virtual Lab• If you have not scheduled your virtual lab yet, you
will see this window, allowing you to schedule your virtual lab on demand. Schedule for 3 hours.
22
Pre-Schedule Your Virtual Labs (Optional)
23
Check Your Remaining Quota (Optional)
600 minutes or 10 hours of virtual lab per week
24
Request for More Quota (Optional)
25
Workshop Course Home Page(cont.)
• Lecture Slides and Recorded Videos– The most updated lecture slides and recorded videos
can be downloaded from the links listed here.
• Course Topics– Each course topic has its own separate section.– It follows the Four-Step Reinforcement Learning
Process.– You can click on the hollow square on the right side of
each separate section to focus on the training materials listed under only that section.
26
4-Step Reinforcement Learning• Step 1: Being Exposed!
– A new concept is introduced by the instructor. If you missed it, you can watch the streaming videos before the next lecture.
• Step 2: Getting Involved! (Optional)– If after listening to the lecture (or watching the videos in Step 1),
you have not yet comfortable with all the concepts, you can practice using the interactive videos after the lecture is over.
• Step 3: Practice Makes Perfect!– You can practice using your dedicated virtual lab during the
lecture sessions, following the steps introduced by the instructor. If you fall behind, just listen to the lecture and take notes. You can perform your lab assignments after the lecture is over.
• Step 4: Mastering the Concepts! (Optional)– You can read about all the detailed functions available in each
Kaseya module by reading the corresponding book chapters. You can then assess your knowledge by taking a quiz.
27
Background Story• Imagine that you were hired by Florida
International University (FIU) as the lead IT Administrator to manage 500 computers.
• Obviously, we cannot provide each one of you with 500 computers to play with!
• Instead, we provide each one of you with a virtual environment that has – One shared SaaS Kaseya Server– 5 dedicated virtual machines– One NAT router
28
Background Story• The virtual machines are distributed in four
buildings– School of Computing & Info. Sciences (SCIS)– Machine Room (MR)– Green Library (GL)– College of Engineering & Computing (CEC)
• More information about your environment– 1 x KServer (a SaaS Account with System Role)– 1 x Windows 2003 Server (Domain Controller)– 4 x Windows XP (only 2 in the domain)– 1 x Linux (playing as a NAT router)
29
FIU’s Network Diagram
SCIS CEC
192.168.0.1
192.168.3.1
192.168.2.1
192.168.3.10
192.168.0.10
192.168.0.100
InternetKaseya Server
dcws1
Instruction Lab
…
GL
PCs &Laptops
Your Laptop/Desktop
MR
NAT ROUTER
192.168.0.0/24 192.168.2.0/24
192.168.3.0/24
192.168.1.10
Machine Room
Guest Desktops
192.168.1.1
192.168.1.0/24
192.168.1.100
…
guest1192.168.2.100
pc1
…
…
30
Technical Information• KServer: saas12.kaseya.net• NAT Router has 4 network cards:
– 192.168.0.1, 1.1, 2.1 and 3.1
• SCIS hosts workstation 1 (ws1) with one card: – ws1.scis.fiu.edu - 192.168.0.100
• MR hosts domain controller (dc) with 3 cards: – dc.mr.fiu.edu - 192.168.0.10, 1.10, and 3.10
• GL hosts guest 1 (guest1) with one card:– guest1.gl.fiu.edu - 192.168.1.100
• CEC hosts personal computer 1 (pc1) and laptop 1 (laptop1), each with one card: – pc1.cec.fiu.edu - 192.168.2.100– laptop1.ced.fiu.edu – 192.168.2.200
31
It Is Your T
urn!
Let’s Start Our Virtual Labs• Find the link to Virtual Lab and clink it.• Simply enter hours/minutes and Confirm. • Three hours may be sufficient for today.
32
It Is Your T
urn!
Virtual Labs PortalNetwork Diagram
33
It Is Your T
urn!
Virtual Labs Portal
Data Sheet
34
It Is Your T
urn!
Virtual Labs Portal
Connection Info• Link to the KServer • RDP connection information to your five
dedicated virtual machines– HostName:PortName
35
Alternative Ways to RDP toYour Virtual Machines
• You can use any RDP client of your choice – Windows
• Microsoft Terminal Server Console (mstsc.exe)
– MAC• Remote Desktop Connection• CoRD
– Linux• Rdesktop
– Web Browser• webRDP, an applet embedded in the Virtual Lab
Portal
– …
36
It Is Your T
urn!
Connecting to Your Virtual Machines Using mstsc.exe
• On your local Windows Machine– Go to Start > Run– Type mstsc.exe
37
It Is Your T
urn!
Use mstsc.exe to connect to dc• Enter Host:Port for Computer; see Data Sheet• Enter your own username and password• Domain is FIU
38
It Is Your T
urn!
Use webRDP to connect to dc
39
Note on RDP Connections• Sometimes when using webRDP, you may
experience that the keyboard and/or mouse do not work. Simply reconnect to resolve the issue (click on the tab).
• To improve the performance of your RDP sessions, you should get rid of the background wallpaper in the XP machines.
• For slow connections, you may choose to use 5 instances of mstsc.exe rather than webRDP.
40
Control Buttons and Timer• You do not need these buttons for any of
the exercises, but just in case you want full control over your dedicated machines, they are provided to you.
• Note: Refresh provides you with a fresh copy of the virtual machine!
• Using + or – you can adjust the remaining time of your virtual lab.
• Use the eject button to cancel your lab.
41
Your Account on KServer• After scheduling your virtual lab for the first
time, a tenant account on our SaaS KServer will be automatically created for you and your username and password will be synced with your account at IT Scholars.
• Note: Your account on VSA is only active during a scheduled virtual lab. – If it complains that your account is disabled, it
simply means that your virtual lab ran out of time or you forgot to schedule one.
42
Final Notes on Virtual Labs• Before working on the labs, make sure that
you are completely familiar with – the background story – the network diagram – the building names– the name of the virtual machines
• Sometimes we refer to your virtual machines as servers and workstations– Servers: dc– Workstations: ws1, guest1, pc1, and laptop1
43
Final Notes on Virtual Labs(cont.)
• Please Follow the Presentation– Don’t worry if you can’t complete the LABs.– You can finish the labs as homework.
• Review Steps– Watch the streaming videos (Step 1)– Work with the Interactive Videos (Step 2)– Practice in Your Virtual Lab (Step 3)
• Check the correctness of your work by looking at the screenshots included lab review slides at the beginning of the next slide set.
– Scan the Book Chapter & Take the Quiz (Step 4)
44
It Is Your T
urn!
Progress Check• Were you able to create your account on
and enroll in the course?• Are you familiar with the IT Scholars’ LMS
Web site?• Are you familiar with the Kaseya Advanced
Course Home Page?• Were you able to download the lecture
slides for Day One? Were you able to start your virtual lab?Were you able to logon to the Kaseya VSA?
45
It Is Your T
urn!
Questions?• Please type your questions in the chat
section of your GoToMeeting window.
• Remember that you can always send your questions to [email protected] too.
• If you are falling behind the steps in the lab, please just watch the presentation, take some notes, and perform your labs after the lecture.
46
Kaseya Advanced Workshop
Advanced Agent Procedures
47
Roadmap!• Day One
– Advanced Agent Procedures
• Day Two– Advanced Monitoring– Advanced Reporting
• Day OneAdvanced Agent Procedures
• Day Two– Advanced Monitoring– Advanced Reporting
48
Good Practices• Usage of Best Practices
– Best practices are practices that the industry has come up with as generally the best way of operating an activity.
• Using Best Practices– Using Best Practices in your organisation,
combined with your own values, opinions and experience turns them into Good Practices.
49
Good Practices• Good Practices consist of:
– Naming conventions– Never use spaces in names– 1st step = Agent Working Directory– 2nd step = Unique storage location– 3rd & Last step = Work Nice & Clean– Use the Agent Procedure log– Enable Reporting– Use notes & description fields
50
File Management• Copy Files TO Agent
– Write File– Get URL– Shell commands (copy, xcopy, robocopy)
• Copy Files FROM Agent – GetFile copy to server– Shell Commands– Transfer File
• Delete Files and Directories• Rename Files• Execute File• Compression or Extraction of Files
51
Variables• Managed Variables• Procedure Variables• Operating System Environment Variables• Global Variables
52
Variables• Results of Agent Procedures
– NOTE: which step it ran and which variables has values.
53
Credentials• To run tasks you must have appropriate
credentials– Agent Procedures runs with either User Logged
in credentials or Kaseya provided credentials• Logged In user is gathered by the KaUsrTsk.exe• Kaseya Provided credentials
– Agent – Credentials– Give Current User Admin Rights– Impersonate User
54
CCleaner• Check to see if CCleaner exists
– Run the CCleaner to cleanup files with the /Auto parameter
– IF NOT then download the installer and install CCleaner application
55
Editing The HOSTS Text File• Redirecting Website request to block access
to unwanted websites
56
Monitoring• Creating Alerts
– Eventcreate– Send Emails– Create Ticket (use email reader)
• Collect information with Agent Procedures– CPU Utilization sample– File Size and Directory Structure Inventory
• Remediate alerts with Agent Procedures– Refer to CCleaner
57
Monitoring• Event Create – creates an event into the Windows Event Log.• Test for a specific state when met execute a shell command to create an event.
– EVENTCREATE [/S system [/U username [/P [password]]]] /ID eventid [/L logname] [/SO srcname] /T type /D description
– Description: This command line tool enables an administrator to create a custom event ID and message in a specified event log.
– Parameter List:– /S system Specifies the remote system to connect to.– /U [domain\]user Specifies the user context under which the command should execute.– /P [password] Specifies the password for the given user context. Prompts for input if omitted.– /L logname Specifies the event log to create an event in.– /T type Specifies the type of event to create. Valid types: SUCCESS, ERROR, WARNING,
INFORMATION.– /SO source Specifies the source to use for the event (if not specified, source will default to
'eventcreate'). A valid source can be any string and should represent the application or component that is generating the event.
– /ID id Specifies the event ID for the event. A valid custom message ID is in the range of 1 - 1000.
– /D description Specifies the description text for the new event.– /? Displays this help message.
• Examples:– EVENTCREATE /T ERROR /ID 1000 /L APPLICATION /D "My custom error event for the application log"– EVENTCREATE /T ERROR /ID 999 /L APPLICATION /SO WinWord /D "Winword event 999 happened due to
low diskspace"– EVENTCREATE /S system /T ERROR /ID 100 /L APPLICATION /D "Custom job failed to install"– EVENTCREATE /S system /U user /P password /ID 1 /T ERROR /L APPLICATION /D "User access failed due to
invalid user credentials"
58
Searching for Unwanted Files• Creating an Alert for Unwanted Files• Create a custom field within Kaseya to flag
for unwanted files• Create an Alert within Kaseya Monitoring
Module when an unwanted file is found• Example – Searching for all MP3 and MP4
files.– If found create an Event Log Entry that Kaseya
will create the appropriate alert to.
59
Searching Unwanted Files• Collect information with Agent Procedures
– Example of looking for all .mp3 and .mp4 files
60
Searching Unwanted Files• Collect information with Agent Procedures
– Example of looking for all .mp3 files<?xml version="1.0" encoding="utf-8"?><ScriptExport xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns="http://www.kaseya.com/vsa/2008/12/Scripting"> <Procedure name="Search for unwanted files" treePres="3" id="885127264" folderId="69189751262456913681237285"> <Body description=""> <Statement description="Create a named procedure variable and assign a value retrieved from the managed machine by the agent." name="GetVariable" continueOnFail="false"> <Parameter xsi:type="EnumParameter" name="VariableType" value="AgentTempDirectory" /> <Parameter xsi:type="StringParameter" name="SourceContent" value="" /> <Parameter xsi:type="StringParameter" name="VariableName" value="agtworkdir" /> </Statement> <Statement description="Create a named procedure variable and assign a value retrieved from the managed machine by the agent." name="GetVariable" continueOnFail="false"> <Parameter xsi:type="EnumParameter" name="VariableType" value="Prompt" /> <Parameter xsi:type="StringParameter" name="SourceContent" value="Enter extension of files to search for (i.e. mp3): " /> <Parameter xsi:type="StringParameter" name="VariableName" value="fileext" /> </Statement> <Statement description="Display a message dialog to the user." name="SendMessage" continueOnFail="false"> <Parameter xsi:type="StringParameter" name="Message" value="running command
dir c:\*.#fileext# /S /O >> #agtworkdir#\unwantedfiles\#fileext#list.txt" /> <Parameter xsi:type="BooleanParameter" name="Immediate" value="True" /> </Statement> <Statement description="Execute the given command as if it were typed in at a command prompt." name="ExecuteShellCommand" continueOnFail="false"> <Parameter xsi:type="StringParameter" name="Command" value="dir c:\*.#fileext# /S /O >> #agtworkdir#\unwantedfiles\#fileext#list.txt" /> <Parameter xsi:type="EnumParameter" name="ExecuteAccount" value="User" /> <Parameter xsi:type="BooleanParameter" name="Is64Bit" value="False" /> </Statement> </Body> </Procedure></ScriptExport>
61
Monitoring• Collect information with Agent Procedures
– CPU Utilization sample• Create a Monitor Set to check for CPU Utilization• Assign Monitor set and select Agent Procedure as
one of the notification type• Call on Agent Procedure “Process Utilization List
(KPerfMon)” – Grabs the Process List and Utilization of machines
processes and outputs to Agent Procedure Logs, GetFiles Location for the Agent, and archives to Kaseya Server also.
62
CPU Processes List
63
Searching Unwanted Files• Procedure creates a file with the unwanted
file extension #fileext#list.txt file in the Agent Working directory\UnWantedFiles folder.
• Options on what to do with the results file????– Copy to Kaseya Server?– Store on the local machine?– Create an alert if unwanted files are found on
the machine.• Use a conditional statement and Event Create
– Create a report to list all machines with Unwanted Files Found
– Create a view to filter machines with Unwanted Files
• Add a Custom Field to be updated by the procedure
64
Installing and Updating Adobe Reader
• Create a view to filter machines with missing Adobe Reader X (10.1)
• Agent Procedures– GET URL –
• ftp://ftp.adobe.com/pub/adobe/reader/win/10.x/10.1.3/en_US/AdbeRdr1013_en_US.exe
• Execute File with the following command line switches• /sAll /rs /msi EULA_ACCEPT=YES REMOVE_PREVIOUS=YES
/qn
65
It Is Your T
urn!
Questions?• Please type your questions in the chat
section of your GoToMeeting window.
• Remember that you can always send your questions to [email protected] too.
• If you are falling behind the steps in the lab, please just watch the presentation, take some notes, and perform your labs after the lecture.
66
Roadmap!• Day One
– Advanced Agent Procedures
• Day Two– Advanced Monitoring– Advanced Reporting
Day OneAdvanced Agent Procedures
• Day Two– Advanced Monitoring– Advanced Reporting
67
THE END!